Authorizations Management

Third-Party Access Risks Explained
Attackers are going after third-party contractors, using their legitimate access to the targets and exploiting security gaps to break in and make off with their ill-gotten goods. But what is it about the ...
Lapsus$’s Breaches — A Wake Up Call for Defense of Identity in Depth
Gabriel Avner | | Access Security, Authorizations Management, Breach, Cybersecurity Awareness Month, Data breach
Okta, Uber, Rockstar, Samsung, Microsoft, Ubisoft, and others have all found themselves in the headlines for having been breached by the Lapsus$ crew. Claiming to be a couple of teens, this group ...
Lessons Learned from Twitter Security Disclosures
Gabriel Avner | | Access Security, Authorizations Management, Cloud Security, Development Pipeline Security, insider threat
In January, Twitter confused the security world by firing their head of security Peiter Zatko — or as he is more commonly known in security circles, Mudge. The severing of ties came ...
Product Update Release Announcement for New REST API Framework and Webhooks
Gabriel Avner | | Authorizations Management, Cloud Security, IaaS Security, Identity-First Security, IdP Security
Today, Authomize announced that we have released an updated version of our REST API framework to enable our customers to connect Authomize’s Cloud Identity and Access Security Platform throughout their environments. The ...

Okta Breach Mitigation and Updates
According to reports, authentication and Identity and Access Management (IAM) solutions provider Okta was breached by the Lapsus$ hacking group... The post Okta Breach Mitigation and Updates appeared first on Authomize ...
Ubiquiti’s Insider Attack is a Textbook Case for Stronger Authorization Security Management
Stories about hacking usually involve some shady characters and a bit of skullduggery. In most cases, it’s just criminal or state actors being... The post Ubiquiti’s Insider Attack is a Textbook Case ...